XWiki Platform vulnerable to data leak via Improper Restriction of XML External Entity Reference
Package
Affected versions
>= 1.1-milestone-3, < 13.10.11
>= 14.0, < 14.4.7
>= 14.5, < 14.10-rc-1
Patched versions
13.10.11
14.4.7
14.10-rc-1
Description
Published by the National Vulnerability Database
Mar 7, 2023
Published to the GitHub Advisory Database
Mar 8, 2023
Reviewed
Mar 8, 2023
Last updated
Mar 8, 2023
Impact
Any user with edit rights on a document can trigger a XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host.
Example to reproduce:
package.xml
content:XXE
) as an attachment (e.g.test.xar
).http://localhost:8080/xwiki/bin/view/Main/XXE?sheet=XWiki.AdminImportSheet&file=test.xar
You'll then notice that the displayed UI contains the content of the
/etc/passwd
file.Patches
The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1.
Workarounds
You'd need to get XWiki Platform sources and apply the changes from xwiki/xwiki-platform@e3527b9 to the
XarPackage
java class and then copy the modified version to yourWEB-INF/classes
directory (or rebuild thexwiki-platform-xar-model
maven module and replace the one found inWEB-INF/lib/
).References
For more information
If you have any questions or comments about this advisory:
References